Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 121 / 207
4129 résultats taggé EN  ✕
Japan space agency hit with cyberattack, rocket and satellite info not accessed | Reuters https://www.reuters.com/technology/cybersecurity/japan-space-agency-hit-with-cyberattack-this-summer-media-2023-11-29/
29/11/2023 10:19:24
QRCode
archive.org
thumbnail

Japan's space agency was hit with a cyberattack but the information the hackers accessed did not include anything important for rocket and satellite operations, a spokesperson said on Wednesday.

reuters EN 2023 Japan space agency cyberattack
InfectedSlurs Botnet Spreads Mirai via Zero-Days https://www.akamai.com/blog/security-research/new-rce-botnet-spreads-mirai-via-zero-days?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
29/11/2023 09:46:41
QRCode
archive.org
thumbnail

Akamai SIRT has uncovered two zero-day vulnerabilities that are being actively exploited to spread a Mirai variant in the wild. Read on for details and mitigation.

akamai EN 2023 Research Threat-Intelligence Mirai china-cat
Spyware Targeting Against Serbian Civil Society - The Citizen Lab https://citizenlab.ca/2023/11/serbia-civil-society-spyware/
28/11/2023 19:25:25
QRCode
archive.org
thumbnail

We confirm that two members of Serbian civil society were targeted with spyware earlier this year. Both have publicly criticized the Serbian government. We are not naming the individuals at this time by their request. The Citizen Lab’s technical analysis of forensic artifacts was conducted in support of an investigation led by Access Now in collaboration with the SHARE Foundation. Researchers from Amnesty International independently analyzed the cases and their conclusions match our findings.

CitizenLab EN 2023 Serbia Pegasus spyware homekit iOS
Spyware in Serbia: civil society under attack - Access Now https://www.accessnow.org/spyware-attack-in-serbia/
28/11/2023 19:23:19
QRCode
archive.org
thumbnail

Access Now and our partners have discovered that civil society in Serbia have been targeted with invasive spyware technology. Here’s what we know.

accessnow EN 2023 Serbia Pegasus spyware homekit iOS
DP World confirms data stolen in cyberattack, no ransomware used https://www.bleepingcomputer.com/news/security/dp-world-confirms-data-stolen-in-cyberattack-no-ransomware-used/
28/11/2023 18:13:19
QRCode
archive.org
thumbnail

International logistics giant DP World has confirmed that data was stolen during a cyber attack that disrupted its operations in Australia earlier this month. However, no ransomware payloads or encryption was used in the attack.

bleepingcomputer EN 2023 Australia Data-Breach Data-Theft DP-World Shipping
DPRK Crypto Theft | macOS RustBucket Droppers Pivot to Deliver KandyKorn Payloads https://www.sentinelone.com/blog/dprk-crypto-theft-macos-rustbucket-droppers-pivot-to-deliver-kandykorn-payloads/
27/11/2023 20:52:43
QRCode
archive.org
thumbnail

Two apparently separate North Korean crypto theft campaigns targeting macOS users appear to be linked as threat actors mix and match droppers and payloads.

sentinelone EN 2023 North-Korea macOS KandyKorn RustBucket DPRK
Report claims to reveal identity of Russian hacktivist leader https://therecord.media/killmilk-identity-revealed-gazeta-ru-killnet-russia
27/11/2023 12:15:39
QRCode
archive.org
thumbnail

Killmilk is a 30-year-old Russian citizen, according to the news site Gazeta.ru. The report has drawn extra scrutiny to Killnet, known for DDoS attacks on Western targets.

therecord EN Killnet Killmilk gazeta.ru doxxing Russia
440,000 Sets of Personal Info Affected by Hack of Line Operator | Nippon.com https://www.nippon.com/en/news/yjj2023112700664
27/11/2023 11:53:33
QRCode
archive.org
thumbnail

LY Corp., which operates popular messaging app Line and internet portal Yahoo! Japan, said Monday that an estimated 440,000 records of personal information may have been compromised by a third-party breach of its system.

nippon Jiji-Press EN 2023 Japan Line leak messaging databreach
MadCat ransom gang caught stealing from other criminals https://cybernews.com/news/madcat-ransomware-gang-stealing-from-criminals/
27/11/2023 11:25:36
QRCode
archive.org

A new strain of ransomware called MadCat has been linked by security researchers to suspected scammers who pretend to sell passport details on the dark web so they can rip off their fellow crooks.

cybernews EN 2023 MadCat darkweb ransomware scammers
Telekopye: Chamber of Neanderthals’ secrets https://www.welivesecurity.com/en/eset-research/telekopye-chamber-neanderthals-secrets/
27/11/2023 10:57:40
QRCode
archive.org
thumbnail

ESET research shares insights about groups operating Telekopye, Telegram bots that scam people in online marketplaces, their internal onboarding process, different tricks of trade that Neanderthals use, and more.

welivesecurity ESET 2023 EN research Telekopye Telegram bots
STA: Power utility HSE suffers serious cyberattack https://english.sta.si/3240098/power-utility-hse-suffers-serious-cyberattack
27/11/2023 10:54:30
QRCode
archive.org

HSE, Slovenia's largest power utility, has been targetted by a cyberattack that started on Wednesday night and escalated on Friday night. In-house and external experts are working to resolve the situation. The supply of electricity is not jeopardised.

sta.si EN 2023 Slovenia HSE cyberattack Critical-infrastructure
Into the Trash: Analyzing LitterDrifter https://research.checkpoint.com/2023/malware-spotlight-into-the-trash-analyzing-litterdrifter/
27/11/2023 10:33:16
QRCode
archive.org
thumbnail

Gamaredon, also known as Primitive Bear, ACTINIUM, and Shuckworm, is a unique player in the Russian espionage ecosystem that targets a wide variety of almost exclusively Ukrainian entities. While researchers often struggle to uncover evidence of Russian espionage activities, Gamaredon is notably conspicuous. The group behind it conducts large-scale campaigns while still primarily focusing on regional targets. The Security Service of Ukraine (SSU) identified the Gamaredon personnel as Russian Federal Security Service (FSB) officers.

checkpoint 2023 EN LitterDrifter Ukraine analysis
iPhone: Why Apple is working hard to break into its own phones https://www.independent.co.uk/tech/iphone-apple-security-software-lockdown-mode-b2450192.html
24/11/2023 16:02:11
QRCode
archive.org
thumbnail

In a secret location in Paris, Apple has hired an elite team of laser-wielding hackers to try and crack its iPhones. Andrew Griffin gets an inside look

independent.co.uk EN 2023 Apple iPhone Internal
USB worm unleashed by Russian state hackers spreads worldwide https://arstechnica.com/security/2023/11/normally-targeting-ukraine-russian-state-hackers-spread-usb-worm-worldwide/
24/11/2023 14:32:45
QRCode
archive.org
thumbnail

LitterDrifter's means of self-propagation are simple. So why is it spreading so widely?

arstechnica EN 2023 Russia-Ukraine-war USB worm LitterDrifter
Thousands of routers and cameras vulnerable to new 0-day attacks by hostile botnet | Ars Technica https://arstechnica.com/security/2023/11/thousands-of-routers-and-cameras-vulnerable-to-new-0-day-attacks-by-hostile-botnet/
24/11/2023 13:49:34
QRCode
archive.org
thumbnail

Internet scans show 7,000 devices may be vulnerable. The true number could be higher.

arstechnica EN 2023 0-day routers cameras mirai
The Ticking Supply Chain Attack Bomb of Exposed Kubernetes Secrets https://blog.aquasec.com/the-ticking-supply-chain-attack-bomb-of-exposed-kubernetes-secrets
24/11/2023 12:16:29
QRCode
archive.org
thumbnail

Aqua Nautilus researchers found exposed Kubernetes secrets that pose a critical threat of supply chain attack to hundreds of organizations and OSS.

aquasec EN 2023 secrets Kubernetes disclosure Supply-chain-attack
How to bypass Windows Hello, log into vulnerable laptops https://www.theregister.com/2023/11/22/windows_hello_fingerprint_bypass/
23/11/2023 06:48:12
QRCode
archive.org
thumbnail

Hardware security hackers have detailed how it's possible to bypass Windows Hello's fingerprint authentication and login as someone else – if you can steal or be left alone with their vulnerable device.

The research was carried out by Blackwing Intelligence, primarily Jesse D'Aguanno and Timo Teräs, and was commissioned and sponsored by Microsoft's Offensive Research and Security Engineering group. The pair's findings were presented at the IT giant's BlueHat conference last month, and made public this week. You can watch the duo's talk below, or dive into the details in their write-up here.

theregister EN 2023 biometric fingerprint bypass Windows Hello
Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors https://unit42.paloaltonetworks.com/two-campaigns-by-north-korea-bad-actors-target-job-hunters/
22/11/2023 15:44:33
QRCode
archive.org
thumbnail

Two ongoing campaigns bear hallmarks of North Korean state-sponsored threat actors, posing in job-seeking roles to distribute malware or conduct espionage.

unit42 EN 2023 North-Korea Job-Related Campaigns threat-actor job-seeking malware espionage
Business Continuity in a Box https://www.cyber.gov.au/smallbusiness/business-continuity-in-a-box
22/11/2023 14:55:16
QRCode
archive.org

Business Continuity in a Box – developed by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), with contributions from the United States Cybersecurity and Infrastructure Security Agency (CISA) – assists organisations with swiftly and securely standing up critical business functions during or following a cyber incident. By using Business Continuity in a Box, organisations can maintain or re-establish the basic functions needed to operate a business while responding to the issues affecting their existing systems.

Cyber.gov.au EN 2023 guide business-continuity cyber-incident
Meet the Unique New "Hacking" Group: AlphaLock https://www.bleepingcomputer.com/news/security/meet-the-unique-new-hacking-group-alphalock/
22/11/2023 14:34:20
QRCode
archive.org
thumbnail

It’s not every day that you discover a new Russian hacking group complete with a song and dance routine (performed live), a sleek user interface (with dark mode!) and a clearly thought-out business model. But that is exactly what our security research team discovered with “AlphaLock,” a “pentesting training organization” that trains hackers and then monetizes their services through a dedicated affiliate program.
...
We originally discovered their group through a public Telegram channel that has since become private. This post will serve as a detailed investigation and description of one of the most brazen, strange, and best marketed cybercrime groups to appear in 2023.

  • Cybercrime sophistication and commoditization continues to grow: We now have a real life example of a threat group that seeks to create its own talent pool through a training program, goes to extensive lengths to market itself, and plans to monetize this through a hacker-for-hire scheme. The level of technical sophistication required to do this isn’t very high, but the level of organizational sophistication and business acumen is quite interesting.
  • Ransomware isn’t the only game in town: Cybercriminals typically choose the path of least resistance that is most likely to prove profitable, this has been increasingly the case as the cybercrime ecosystem has evolved into a functional market economy. However AlphaLock represents another potential method to both monetize and democratize cybercrime. This could be a particularly interesting model alternative for ransomware groups if the U.S. follows through with the proposal of banning ransomware payments.
  • A Technical Threat Actor Supply Shortage? One of the most fascinating things about AlphaLock is they want to create a pipeline of talent to populate their hacker marketplace. This suggests that there may be limitations on the supply of talented threat actors that have the required degree of sophistication to the point where they have tried to build their own pipeline of actors.
  • The Brand: Our researchers have noted an increasing focus on group “brand” and identity among financially motivated threat groups. AlphaLock has clearly made significant investments in time to create a brand and reputation for itself. Notice in the final post they even advertise that they are looking to hire someone to market themselves on Telegram and social media.
  • Blurred Lines: Many security practitioners have often assumed that threat actors primarily operate on the dark web. In most cases today this isn’t the case. There are increasingly blurred lines between clear web sites, Tor, and social media applications such as Telegram that create easy avenues for threat actors to congregate and communicate.
bleepingcomputer EN 2023 AlphaLock Cybersecurity Flare Penetration-Testing Telegram Threat-Intelligence Russia
page 121 / 207
4712 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio